0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (18)
  • R250 - R500 (76)
  • R500+ (1,097)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General

Linux - Konzepte, Kommandos, Oberflachen (German, Hardcover, 2003 ed.): Jurgen Gulbins, Karl Obermayr, snoopy Linux - Konzepte, Kommandos, Oberflachen (German, Hardcover, 2003 ed.)
Jurgen Gulbins, Karl Obermayr, snoopy
R2,647 Discovery Miles 26 470 Ships in 10 - 15 working days

Dieses Hand- und Arbeitsbuch stellt die Konzepte und Anwendungstechniken von Linux vor. Viele Einzelheiten werden zusammenhangend und verstandlich dargestellt. Die Autoren beschreiben die haufig verwendeten Kommandos und Funktionen detailliert und erlautern sie an zahlreichen Beispielen. Damit soll das Werk den Einstieg in Linux und den Umstieg auf Linux erleichtern und dem Benutzer und Administrator als kompaktes Nachschlagewerk bei der taglichen Arbeit am Linux-Rechner dienen. Es werden sowohl die alphanumerische Oberflache als auch die grafischen Oberflachen KDE und GNOME behandelt. Die Autoren verfugen uber langjahrige Erfahrungen aus der Praxis mit UNIX und Linux und gehen vor allem auf SuSE- und Red Hat-Linux ein.

"

Git for Teams (Paperback): Emma Jane Hogbin Westby Git for Teams (Paperback)
Emma Jane Hogbin Westby
R1,260 Discovery Miles 12 600 Ships in 18 - 22 working days

You can do more with Git than just build software. This practical guide delivers a unique people-first approach to version control that also explains how using Git as a focal point can help your team work better together. You'll learn how to plan and pursue a Git workflow that not only ensures that you accomplish project goals, but also fits the immediate needs and future growth of your team. The first part of the book on structuring workflow is useful for project managers, technical team leads, and CTOs. The second part provides hands-on exercises to help developers gain a better understanding of Git commands. Explore the dynamics of team building Walk through the process of creating and deploying software with Git Structure workflow to influence the way your team collaborates Learn a useful process for conducting code reviews Set up a shared repository and identify specific team members as contributors, consumers, or maintainers Know the why behind the Git commands your teammates use Use branching strategies to separate different approaches to your project Examine popular collaboration platforms: GitHub, Bitbucket, and GitLab

Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Hardcover): Brij B. Gupta Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Hardcover)
Brij B. Gupta
R4,841 Discovery Miles 48 410 Ships in 10 - 15 working days

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

Sicheres Netzwerkmanagement - Konzepte, Protokolle, Tools (German, Hardcover, 2006 ed.): Thomas Schwenkler Sicheres Netzwerkmanagement - Konzepte, Protokolle, Tools (German, Hardcover, 2006 ed.)
Thomas Schwenkler
R1,363 Discovery Miles 13 630 Ships in 18 - 22 working days

Die Administration komplexer Rechnernetzwerke verlangt durch die standige Weiterentwicklung etablierter Standards und die Integration ganzlich neuer Technologien ein umfassendes technisches Know-how von Administratoren und Systementwicklern. Dabei ist insbesondere die Sicherheit und Verfugbarkeit aller Systemkomponenten von zentraler Bedeutung fur die Funktionsfahigkeit eines Netzes.

Das vorliegende Buch gibt eine fundierte und umfassende Darstellung zentraler Techniken und nutzlicher Werkzeuge zur TCP/IP-Netzwerk-Konfiguration und -Uberwachung. Besonderes Augenmerk wird dabei auf Sicherheitsbedrohungen und deren wirksame Abwehr mittels entsprechender Netzwerkmanagement-Tools gelegt.

Das Spektrum der betrachteten Technologien reicht von etablierten Netzwerkprotokollen uber den Einsatz komplexer Software-Systeme bis hin zu aktuellen Trends der drahtlosen Kommunikation und priorisierten Datenstrome des Quality of Service (QoS).

Blockchain and Trustworthy Systems - 4th International Conference, BlockSys 2022, Chengdu, China, August 4-5, 2022, Revised... Blockchain and Trustworthy Systems - 4th International Conference, BlockSys 2022, Chengdu, China, August 4-5, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Davor Svetinovic, Yin Zhang, Xiapu Luo, Xiaoyan Huang, Xingping Chen
R2,226 Discovery Miles 22 260 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference papers of the 4th International Conference on Blockchain and Trustworthy Systems, Blocksys 2022, held in Chengdu, China, in August 2022. The 26 full papers were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections: Trustworthy Systems; Blockchain; Private Computing.

Blockchain Technology and Application - 5th CCF China Blockchain Conference, CBCC 2022, Wuxi, China, December 23-25, 2022,... Blockchain Technology and Application - 5th CCF China Blockchain Conference, CBCC 2022, Wuxi, China, December 23-25, 2022, Proceedings (Paperback, 1st ed. 2022)
Yi Sun, Liang Cai, Wei Wang, Xianhua Song, Zeguang Lu
R1,705 Discovery Miles 17 050 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th CCF China Blockchain Conference, CBCC 2022, held in Wuxi, China, in December 2022. The 7 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers deal with research results and development activities in all aspects of blockchain science and technology.

The Basics of Line Balancing and JIT Kitting (Paperback): Beverly Townsend The Basics of Line Balancing and JIT Kitting (Paperback)
Beverly Townsend
R770 Discovery Miles 7 700 Ships in 10 - 15 working days

Accessible to the Lean novice and shop floor employee, The Basics of Line Balancing and JIT Kitting explores line balancing and the pre-assembly of components into a finished product in a just-in-time fashion (JIT Kitting). It explains how to use time studies, develop yamazumi charts, discover and eliminate waste, balance your line, and create new standard work content for the shop floor. The book facilitates a clear understanding of the seven deadly wastes (muda) as well as what you can do to eliminate them from your facility. Describing the purpose and use of standard work, it explains how to properly staff work cells and how to develop flex plans for fluctuations in demand using this data. The first few chapters explain how to determine takt time and how to use that information along with time studies to identify when you are not meeting customer demand. The chapters on JIT Kitting explain how there are other advantages to kitting besides eliminating waste and increasing productivity. The book explains how you can use JIT Kitting to improve quality by having the parts available and limiting the options of numerous parts to the operator. It also provides the understanding needed to ensure the right parts are installed, thereby correcting issues with the build of materials.

Design and Architecture for Signal and Image Processing - 15th International Workshop, DASIP 2022, Budapest, Hungary, June... Design and Architecture for Signal and Image Processing - 15th International Workshop, DASIP 2022, Budapest, Hungary, June 20-22, 2022, Proceedings (Paperback, 1st ed. 2022)
Karol Desnos, Sergio Pertuz
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Design and Architecture for Signal and Image Processing, DASIP 2022, held in Budaypest, Hungary in June 2022. The 13 full included in the volume were carefully reviewed and selected from 32 submissions. They are organized in the following topical sections: leading signal, image and video processing and machine learning in custom embedded, edge and cloud computing architectures and systems.

Basiswissen Soa - Bi - Crm - Ecm (German, Hardcover): Tredition Basiswissen Soa - Bi - Crm - Ecm (German, Hardcover)
Tredition
R1,482 Discovery Miles 14 820 Ships in 10 - 15 working days

Dieses Buch erlautert, was hinter den aktuellen Buzzwords aus der Business-IT wirklich steckt. Dabei konzentriert es sich auf die vier wichtigen Kernthemen SOA (Service Orientierte Architekturen), BI (Business Intelligence), CRM (Customer Relationship Management) und ECM (Enterprise Content Management). Sie erfahren, welche Ziele mit diesen Technologien erreicht werden sollen, welche Komponenten daran beteiligt sind, welche Produkte der Markt anbietet und worauf Sie bei einer Einfuhrung unbedingt achten sollten. Dabei richtet sich das Buch an technisch orientierte Leser, die diese Themen von der IT-Seite her angehen. Nach einer kurzen Einfuhrung folgen die technischen Grundlagen und dazu passende praxisrelevante Beispiele. So werden etwa Datamining-Verfahren fur Business Intelligence erlautert, die mehr liefern als die banale Aussage Wer Bier kauft, kauft auch Chips." Zudem bietet dieses Buch auch einen Uberblick uber die wichtigsten Hersteller und Losungsanbieter in den jeweiligen Produktkategorien. Entscheidungshilfen und konkrete, praxisbezogenen Produktempfehlungen runden die jeweiligen Schwerpunktthemen ab.

Real-Time Systems - Design Principles for Distributed Embedded Applications (Hardcover, 3rd ed. 2022): Hermann Kopetz, Wilfried... Real-Time Systems - Design Principles for Distributed Embedded Applications (Hardcover, 3rd ed. 2022)
Hermann Kopetz, Wilfried Steiner
R1,349 Discovery Miles 13 490 Ships in 9 - 17 working days

"This book is a comprehensive text for the design of safety critical, hard real-time embedded systems. It offers a splendid example for the balanced, integrated treatment of systems and software engineering, helping readers tackle the hardest problems of advanced real-time system design, such as determinism, compositionality, timing and fault management. This book is an essential reading for advanced undergraduates and graduate students in a wide range of disciplines impacted by embedded computing and software. Its conceptual clarity, the style of explanations and the examples make the abstract concepts accessible for a wide audience." Janos Sztipanovits, Director E. Bronson Ingram Distinguished Professor of Engineering Institute for Software Integrated Systems Vanderbilt University Real-Time Systems focuses on hard real-time systems, which are computing systems that must meet their temporal specification in all anticipated load and fault scenarios. The book stresses the system aspects of distributed real-time applications, treating the issues of real-time, distribution and fault-tolerance from an integral point of view. A unique cross-fertilization of ideas and concepts between the academic and industrial worlds has led to the inclusion of many insightful examples from industry to explain the fundamental scientific concepts in a real-world setting. Compared to the Second Edition, new developments in communication standards for time-sensitive networks, such as TSN and Time-Triggered Ethernet are addressed. Furthermore, this edition includes a new chapter on real-time aspects in cloud and fog computing. The book is written as a standard textbook for a high-level undergraduate or graduate course on real-time embedded systems or cyber-physical systems. Its practical approach to solving real-time problems, along with numerous summary exercises, makes it an excellent choice for researchers and practitioners alike.

ScreenOS Cookbook (Paperback): Stefan Brunner ScreenOS Cookbook (Paperback)
Stefan Brunner; Contributions by Vik Davar, Joe Kelly, Ken Draper, David Delcourt
R1,522 Discovery Miles 15 220 Ships in 18 - 22 working days

Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track. ScreenOS Cookbook gives you real-world fixes, techniques, and configurations that save time -- not hypothetical situations out of a textbook. The book comes directly from the experience of engineers who have seen and fixed every conceivable ScreenOS network topology, from small branch office firewalls to appliances for large core enterprise and government, to the heavy duty protocol driven service provider network. Its easy-to-follow format enables you to find the topic and specific recipe you need right away and match it to your network and security issue. Topics include: * Configuring and managing ScreenOS firewalls * NTP (Network Time Protocol) * Interfaces, Zones, and Virtual Routers * Mitigating Denial of Service Attacks * DDNS, DNS, and DHCP * IP Routing * Policy-Based Routing * Elements of Policies * Authentication * Application Layer Gateway (SIP, H323, RPC, RTSP, etc.,) * Content Security * Managing Firewall Policies * IPSEC VPN * RIP, OSPF, BGP, and NSRP * Multicast -- IGPM, PIM, Static Mroutes * Wireless Along with the usage and troubleshooting recipes, you will also find plenty of tricks, special considerations, ramifications, and general discussions of interesting tangents and network extrapolation. For the accurate, hard-nosed information you require to get your ScreenOS firewall network secure and operating smoothly , no book matches ScreenOS Cookbook.

Essential CVS 2e (Paperback, 2nd Revised edition): Jennifer Vesperman Essential CVS 2e (Paperback, 2nd Revised edition)
Jennifer Vesperman
R1,036 R889 Discovery Miles 8 890 Save R147 (14%) Ships in 18 - 22 working days

This easy-to-follow reference shows a variety of professionals how to use the Concurrent Versions System (CVS), the open source tool that lets you manage versions of anything stored in files. Ideal for software developers tracking different versions of the same code, this new edition has been expanded to explain common usages of CVS for system administrators, project managers, software architects, user-interface (UI) specialists, graphic designers and others. Current for version 1.12, "Essential CVS, 2nd Edition" offers an overview of CVS, explains the core concepts, and describes the commands that most people use on a day-to-day basis. For those who need to get up to speed rapidly, the book's Quickstart Guide shows you how to build and use a basic CVS repository with the default settings and a minimum of extras. You'll also find: a full command reference that details all aspects of customizing CVS for automation, logging, branching, merging documents, and creating alerts; examples and descriptions of the most commonly used options for each command; why and when to tag or branch your project, tagging before releases, and using branching to create a bugfix version of a project; and, details on the systems used in CVS to permit multiple developers to work on the same project without loss of data. An entire section devoted to document version management and project management includes ways to import and export projects, work with remote repositories, and shows how to fix things that can go wrong when using CVS. You'll find more screenshots in this edition as well as examples of using graphical CVS clients to run CVS commands. "Essential CVS" also includes a FAQ that answers common queries in the CVS mailing list to get you up and running with this system quickly and painlessly.

Guide to Operating Systems (Paperback, 5th edition): Greg Tomsho Guide to Operating Systems (Paperback, 5th edition)
Greg Tomsho
R1,372 R1,272 Discovery Miles 12 720 Save R100 (7%) Ships in 10 - 15 working days

Discover the latest information for working on Windows, Mac OS, and UNIX/Linux platforms with GUIDE TO OPERATING SYSTEMS, 5E. You examine operating system theory, installation, upgrading, configuring operating system and hardware, file systems, virtualization, security, hardware options, storage, resource sharing, network connectivity, maintenance, and troubleshooting. Easily understood and highly practical, GUIDE TO OPERATING SYSTEMS, 5E is the resource you need to deepen your understanding of different operating systems. This edition helps you understand the fundamental concepts of computer operating systems. The book specifically addresses Windows 10 and earlier Windows client OSs, Windows Server 2012 R2 and earlier Windows server OSs with a preview of Windows Server 2016, Fedora Linux, and Mac OS X El Capitan and earlier. In addition, general information prepares you to work with many other operating systems.

The Practice of Enterprise Modeling - 14th IFIP WG 8.1 Working Conference, PoEM 2021, Riga, Latvia, November 24-26, 2021,... The Practice of Enterprise Modeling - 14th IFIP WG 8.1 Working Conference, PoEM 2021, Riga, Latvia, November 24-26, 2021, Proceedings (Paperback, 1st ed. 2021)
Estefania Serral, Janis Stirna, Jolita Ralyte, Janis Grabis
R1,978 Discovery Miles 19 780 Ships in 18 - 22 working days

This book constitutes the proceedings papers of the 14th IFIP Working Conference on the Practice of Enterprise Modeling, held in Riga, Latvia, during November 24-26, 2021. PoEM offers a forum for sharing experiences and knowledge between the academic community and practitioners from industry and the public sector. This year the theme of the conference is the use of enterprise modeling and enterprise architecture towards ensuring sustainability and resilience of enterprises and societies. The 14 full and 6 short papers presented in this volume were carefully reviewed and selected from a total of 47 submissions. They were organized in topical sections named: enterprise modeling and enterprise architecture; enterprise modeling methods and method engineering; business process modeling and management; requirements engineering for privacy, security and governance; and case studies and experiences.

Sendmail Cookbook (Paperback): Craig Hunt Sendmail Cookbook (Paperback)
Craig Hunt
R1,120 R948 Discovery Miles 9 480 Save R172 (15%) Ships in 18 - 22 working days

More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administrators--and not without reason. sendmail configuration languages are as complex as any other programming languages, but used much more infrequently--only when sendmail is installed or configured. The average system administrator doesn't get enough practice to truly master this inscrutable technology.

Fortunately, there's help. The "sendmail Cookbook" provides step-by-step solutions for the administrator who needs to solve configuration problems fast. Say you need to configure sendmail to relay mail for your clients without creating an open relay that will be abused by spammers. A recipe in the Cookbook shows you how to do just that. No more wading through pages of dense documentation and tutorials and creating your own custom solution--just go directly to the recipe that addresses your specific problem.

Each recipe in the "sendmail Cookbook" outlines a configuration problem, presents the configuration code that solves that problem, and then explains the code in detail. The discussion of the code is critical because it provides the insight you need to tweak the code for your own circumstances.

The "sendmail Cookbook" begins with an overview of the configuration languages, offering a quick how-to for downloading and compiling the sendmail distribution. Next, you'll find a baseline configuration recipe upon which many of the subsequent configurations, or recipes, in the book are based. Recipes in the following chapters stand on their own and offer solutions for properly configuring important sendmail functions such as:

Delivering and forwarding mail

Relaying

Masquerading

Routing mail

Controlling spam

Strong authentication

Securing the mail transport

Managing the queue

Securing sendmail

"sendmail Cookbook" is more than just a new approach to discussing sendmail configuration. The book also provides lots of new material that doesn't get much coverage elsewhere--STARTTLS and AUTH are given entire chapters, and LDAP is covered in recipes throughout the book. But most of all, this book is about saving time--something that most system administrators have in short supply. Pick up the "sendmail Cookbook" and say good-bye to sendmail dread.

RTF Pocket Guide (Paperback): Sean M. Burke RTF Pocket Guide (Paperback)
Sean M. Burke
R230 R216 Discovery Miles 2 160 Save R14 (6%) Ships in 18 - 22 working days

Any programmer working with text files today needs a way to deal with Microsoft® Word documents and their underlying Rich Text Format. RTF is notoriously difficult to work with, and our handy quick reference is the only book available on what many developers call "this maddeningly unstructured format." Small and easy to use on the job, RTF Pocket Guide focuses on the "workhorse" codes that programmers can't do without, including text style codes, paragraph formatting codes, and page formatting codes-- all with many examples of real use.

Samba Pocket Reference 2e (Paperback, 2nd Revised edition): Jay Ts Samba Pocket Reference 2e (Paperback, 2nd Revised edition)
Jay Ts
R225 R210 Discovery Miles 2 100 Save R15 (7%) Ships in 18 - 22 working days

The current edition of Samba Pocket Reference covers Samba 2.x and the most important features of 3.0, which was under development as this book went to print. New options pertain to Samba's acting as a primary domain controller and as a domain member server, its support for the use of Windows NT/2000/XP authentication and filesystem security on the host Unix system, and access to shared files and printers from Unix clients.

DNS & Bind Cookbook (Paperback, 1st ed): Cricket Liu DNS & Bind Cookbook (Paperback, 1st ed)
Cricket Liu
R877 R756 Discovery Miles 7 560 Save R121 (14%) Ships in 18 - 22 working days

The DNS & BIND Cookbook presents solutions to the many problems faced by network administrators responsible for a name server. This title is an indispensable companion to DNS & BIND, 4th Edition, the definitive guide to the critical task of name server administration. The cookbook contains dozens of code recipes showing solutions to everyday problems, ranging from simple questions, like, "How do I get BIND?" to more advanced topics like providing name service for IPv6 addresses.

System Performance Tuning (Paperback, 2nd edition): Gian-Paolo Musumeci & Mike Loukides System Performance Tuning (Paperback, 2nd edition)
Gian-Paolo Musumeci & Mike Loukides
R1,008 R861 Discovery Miles 8 610 Save R147 (15%) Ships in 18 - 22 working days

System Performance Tuning covers two distinct areas: performance tuning, or the art of increasing performance for a specific application, and capacity planning, or deciding what hardware best fulfills a given role. Underpinning both subjects is the science of computer architecture. This book focuses on the operating system, the underlying hardware, and their interactions. For system administrators who want a hands-on introduction to system performance, this is the book to recommend.

Salt Open - Automating Your Enterprise and Your Network (Paperback, 1st ed.): Andrew Mallett Salt Open - Automating Your Enterprise and Your Network (Paperback, 1st ed.)
Andrew Mallett
R1,177 R980 Discovery Miles 9 800 Save R197 (17%) Ships in 18 - 22 working days

There is a rapid growth of automation in server rooms and data centers. The days of having many administrators running around busily configuring and maintaining servers are gone and have been replaced with droves of Salt-Minions; agents beavering away on the target nodes ensuring the configuration is as specified. This book covers Salt Open (also known as SaltStack Open) from the ground up and shows you how to work with two Linux distributions. You'll see how Salt Open is duplicated with ArubaOS and IOS networking devices, which can be configured without the underlying OS. As you step through the configuration options, you'll learn how to run remote execution modules from the CLI before looking at stateful configuration using SLS files. Moving on, you'll learn how to configure the systems where you also need to monitor your devices and that is when reactors and beacons come into play. Creating beacons to alert the server when thresholds are exceeded, you will be able to create reactors to mitigate the issues identified by the beacons. By the end of this book, you will be able to deploy Salt to your servers and network infrastructure. You will be able to install the Salt-Master and Salt-Minion, executing commands from both the Master and the Minion. The networking devices you need to manage will be controlled through the Salt_Proxy Minions that you have configured. Finally, you will be able to load-balance connections to the master with Salt-Syndic. What You'll Learn Install Salt Services on Ubuntu and CentOS based systems Work with remote execution modules Format YAML files correctly Provide defined configuration using state files Use Salt-Proxy to configure network devices Automate the configuration of Linux servers and networking devices Add value for both the server and network automation team Who This Book Is For System administrators experienced in Linux administration, who desire to expand their horizons into the world of automation, moving from scripts to states.

Web Services - ICWS 2022 - 29th International Conference, Held as Part of the Services Conference Federation, SCF 2022,... Web Services - ICWS 2022 - 29th International Conference, Held as Part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, Proceedings (Paperback, 1st ed. 2022)
Yuchao Zhang, Liang-Jie Zhang
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

This book constitutes the proceedings of the 29th International Conference on Web Services, ICWS 2022, held in Honolulu, USA, as part of SCF 2022, during December 10-14, 2022.The 9 full papers presented in this volume were carefully reviewed and selected from 20 submissions. The papers cover aspects of services computing and applications. Centered around services computing, it covers various systems and networking research pertaining to cloud, edge and Internet-of-Things (IoT), as well as technologies for intelligent computing, learning, big data and blockchain applications.

The Authoritative Guide on Harbor - Management and Practice of Cloud Native Artifacts Such as Container Images and Helm Charts... The Authoritative Guide on Harbor - Management and Practice of Cloud Native Artifacts Such as Container Images and Helm Charts (Paperback, 1st ed. 2022)
Haining Zhang, Yan Wang
R1,760 Discovery Miles 17 600 Ships in 18 - 22 working days

Harbor is a major CNCF open source project, with thousands of production users all over the world. This book provides a comprehensive explanation of the open source cloud native registry: Harbor. Written by experts who contributed to and now maintain Harbor, the content covers its architecture, principles, functions, deployment and configuration, scanning artifacts, remote replication, operation and maintenance, customized development, API usage and success stories. The book offers a valuable guide for Harbor users, developers and contributors, cloud native software development engineers, test engineers, operational and maintenance engineers, IT architects and IT technical managers. It will also benefit university students in computer-related disciplines.

Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected... Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Ittay Eyal, Juan Garay
R2,999 Discovery Miles 29 990 Ships in 18 - 22 working days

This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.

Foundations of ARM64 Linux Debugging, Disassembling, and Reversing - Analyze Code, Understand Stack Memory Usage, and... Foundations of ARM64 Linux Debugging, Disassembling, and Reversing - Analyze Code, Understand Stack Memory Usage, and Reconstruct Original C/C++ Code with ARM64 (Paperback, 1st ed.)
Dmitry Vostokov
R1,167 R970 Discovery Miles 9 700 Save R197 (17%) Ships in 18 - 22 working days

Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you'll need to understand internal Linux program structure and behavior. Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. What You'll Learn Review the basics of ARM64 assembly language Examine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patterns See how pointers in C and C++ are implemented and used Who This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without ARM64 assembly language background, and beginners learning Linux software reverse engineering techniques.

Networked Systems - 10th International Conference, NETYS 2022, Virtual Event, May 17-19, 2022, Proceedings (Paperback, 1st ed.... Networked Systems - 10th International Conference, NETYS 2022, Virtual Event, May 17-19, 2022, Proceedings (Paperback, 1st ed. 2022)
Mohammed-Amine Koulali, Mira Mezini
R1,417 Discovery Miles 14 170 Ships in 18 - 22 working days

This book constitutes the revised selected papers of the 10th International Conference on Networked Systems, NETYS 2022, held as virtual event, in May 17-19, 2022. The conference was held virtually due to the COVID-19 crisis.The 18 full papers and 2 short papers presented were carefully reviewed and selected from 100 submissions. The scope of the conference covers all aspects related to the design and the development of these systems, including multi-core architectures, Concurrent and distributed algorithms, parallel/concurrent/distributed programming, distributed databases, big data applications and systems, cloud systems, networks, security, and formal verification. They were organized in topical sections as follows: Distributed System; Networking; Verification; Security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
High-Latitude Rainforests and Associated…
Richard G Lawford, Paul Alaback, … Hardcover R4,248 Discovery Miles 42 480
Butterfly Conservation in South-Eastern…
Tim R. New Hardcover R4,021 Discovery Miles 40 210
The Vegetation of Egypt
M. A. Zahran, A.J. Willis Hardcover R5,216 Discovery Miles 52 160
Crowell Hilaka and the Richfield…
Lynn Scholle Richardson Hardcover R704 Discovery Miles 7 040
Called By The Wild - The Dogs Trained To…
Conraad de Rosner, Graham Spence, … Paperback R340 R304 Discovery Miles 3 040
Migration - The Biology of Life on the…
Hugh Dingle Hardcover R4,677 Discovery Miles 46 770
Sensitivity Analysis: Matrix Methods in…
Hal Caswell Hardcover R1,556 Discovery Miles 15 560
Return to Pō
Jon-Erik Jardine Hardcover R580 R529 Discovery Miles 5 290
The Antarctic Silverfish: a Keystone…
Marino Vacchi, Eva Pisano, … Hardcover R2,715 Discovery Miles 27 150
Wilding - The Return of Nature to a…
Isabella Tree Hardcover  (1)
R725 R631 Discovery Miles 6 310

 

Partners